{"id":24835,"date":"2025-03-31T09:36:41","date_gmt":"2025-03-31T07:36:41","guid":{"rendered":"https:\/\/enginsight.com\/siem\/"},"modified":"2025-03-31T09:56:11","modified_gmt":"2025-03-31T07:56:11","slug":"siem","status":"publish","type":"page","link":"https:\/\/enginsight.com\/en\/siem\/","title":{"rendered":"SIEM"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"24835\" class=\"elementor elementor-24835 elementor-24542\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2360d2ad elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"2360d2ad\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2c2fcac0\" data-id=\"2c2fcac0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section data-gradient='{\"angle\":-45,\"colors\":[{\"_id\":\"81bc933\",\"premium_gradient_colors\":\"#283AB8\"},{\"_id\":\"3ebcf24\",\"premium_gradient_colors\":\"#8D379E\"},{\"_id\":\"64cb559\",\"premium_gradient_colors\":\"#F13484\"},{\"_id\":\"88a4e48\",\"premium_gradient_colors\":\"#FF605D\"}]}' class=\"elementor-section elementor-inner-section elementor-element elementor-element-3ce4fefd premium-gradient-yes elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3ce4fefd\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"video\",\"background_video_link\":\"https:\\\/\\\/enginsight.com\\\/wp-content\\\/uploads\\\/SIEM-Header-Video.mov\",\"shape_divider_bottom\":\"curve-asymmetrical\",\"shape_divider_bottom_negative\":\"yes\",\"background_play_on_mobile\":\"yes\"}'>\n\t\t\t\t\t\t\t\t<div class=\"elementor-background-video-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M615.2,96.7C240.2,97.8,0,18.9,0,0v100h1000V0C1000,19.2,989.8,96,615.2,96.7z\"><\/path>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-381b4549\" data-id=\"381b4549\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-424b59c1 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"424b59c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">SIEM system from Enginsight <\/span><span class=\"premium-dual-header-second-header \">Your SIEMphony for cyber attack detection and defense<\/span><\/h1> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a498c85 elementor-widget elementor-widget-text-editor\" data-id=\"a498c85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-slate-fragment=\"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\">Enginsight SIEM (Security Information and Event Management) gives you <strong>proactive, real-time protection<\/strong> and comprehensive security intelligence across all data sources. Like a good symphony, all the software components in Enginsight work together and automatically enrich the SIEM system with information from the area of attack detection. This allows you to create not just reactive logging, but proactive security.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63f5c446 elementor-align-left elementor-mobile-align-left elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-global elementor-global-25309 elementor-global-23749 elementor-widget-button\" data-id=\"63f5c446\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/enginsight.com\/en\/demo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Request demo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c899459\" data-id=\"c899459\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b31b6d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1b31b6d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-455147d\" data-id=\"455147d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4d1d9f premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"a4d1d9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Log management and logging <\/span><span class=\"premium-dual-header-second-header \">The SIEM tool with integrated attack detection system <\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7906bbc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7906bbc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-20e77ac\" data-id=\"20e77ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd2bd85 elementor-widget elementor-widget-image\" data-id=\"dd2bd85\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation\":\"none\"}' data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"537\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/Cyberwar-fighter-enginsight-2.jpg\" class=\"attachment-full size-full wp-image-23792\" alt=\"Cyberwar-fighter-enginsight\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/Cyberwar-fighter-enginsight-2.jpg 800w, https:\/\/enginsight.com\/wp-content\/uploads\/Cyberwar-fighter-enginsight-2-300x201.jpg 300w, https:\/\/enginsight.com\/wp-content\/uploads\/Cyberwar-fighter-enginsight-2-768x516.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25c4a7f elementor-widget elementor-widget-heading\" data-id=\"25c4a7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Proactive security<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b6fab2 elementor-widget elementor-widget-text-editor\" data-id=\"4b6fab2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Enginsight&#x2019;s all-in-one platform supports the SIEM tool in complying with legal and industry-specific standards. Fulfil the technical cybersecurity requirements for KRITIS and in future also NIS2 &#x2013; today.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-bdc8f9a\" data-id=\"bdc8f9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f86d734 elementor-widget elementor-widget-image\" data-id=\"f86d734\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation\":\"none\"}' data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"556\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/enginsight-dsgvo-konform.jpg\" class=\"attachment-full size-full wp-image-24608\" alt=\"enginsight-dsgvo-konform\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/enginsight-dsgvo-konform.jpg 800w, https:\/\/enginsight.com\/wp-content\/uploads\/enginsight-dsgvo-konform-300x209.jpg 300w, https:\/\/enginsight.com\/wp-content\/uploads\/enginsight-dsgvo-konform-768x534.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b07404 elementor-widget elementor-widget-heading\" data-id=\"7b07404\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">EU-DSGVO compliant<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc377c0 elementor-widget elementor-widget-text-editor\" data-id=\"dc377c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pseudonymization of personal data within logs. Define responsibilities and individual user roles for depseudonymization. All data can be hosted on your premises as an on-premises solution.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-1cd31b7\" data-id=\"1cd31b7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a3c228c elementor-widget elementor-widget-image\" data-id=\"a3c228c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation\":\"none\"}' data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"556\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/Enginsight-Normen-Security-1.jpg\" class=\"attachment-large size-large wp-image-24603\" alt=\"Enginsight-Normen-Security\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/Enginsight-Normen-Security-1.jpg 800w, https:\/\/enginsight.com\/wp-content\/uploads\/Enginsight-Normen-Security-1-300x209.jpg 300w, https:\/\/enginsight.com\/wp-content\/uploads\/Enginsight-Normen-Security-1-768x534.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9c6b62 elementor-widget elementor-widget-heading\" data-id=\"a9c6b62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">KRITIS and NIS2-ready<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09cac80 elementor-widget elementor-widget-text-editor\" data-id=\"09cac80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The all-in-one platform helps meet regulatory and industry standards. Meet the technical cybersecurity requirements for KRITIS and future NIS2 &#x2013; today.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-758a549b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"758a549b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-43aa3684\" data-id=\"43aa3684\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-703358f1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"703358f1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-47428efb\" data-id=\"47428efb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7dd95f0 elementor-widget elementor-widget-heading\" data-id=\"7dd95f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Continuous monitoring and documentation of your IT security.<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-481c1d86\" data-id=\"481c1d86\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-31e8e248 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"31e8e248\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Enginsight combines the most important security functions, such as vulnerability management, intrusion detection, data integrity monitoring or micro-segmentation with the functions of a SIEM system and thus creates not only reactive logs, but proactive IT security for all IT environments.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-613cfc6b\" data-id=\"613cfc6b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-215415ea elementor-widget elementor-widget-image\" data-id=\"215415ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/made-in-germany-enginsight-1-q0quox5caqcf4tmqfjum7o1lb6c6kr8877smn0rsh4.png\" title=\"made-in-germany-enginsight\" alt=\"made-in-germany-enginsight\" loading=\"lazy\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e2800d6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2e2800d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7d2d9d8b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7d2d9d8b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-7571c80e\" data-id=\"7571c80e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-23585963 elementor-widget elementor-widget-image-carousel\" data-id=\"23585963\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"slides_to_show\":\"4\",\"navigation\":\"none\",\"lazyload\":\"yes\",\"pause_on_hover\":\"no\",\"pause_on_interaction\":\"no\",\"autoplay_speed\":0,\"speed\":10000,\"autoplay\":\"yes\",\"infinite\":\"yes\"}' data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/ZapfCreation-sw-1-q094tsonfus5sokb027hqfs8bt79dwl2xaszo56134.png\" alt=\"ZapfCreation-sw\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/G-DATA-Logo-TIGS-2017-RGB-pwdtje60w4w3cy3jjnmft7c5795ouezzvrw57b1szk.jpg\" alt=\"G DATA Logo\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/tuev-WEISS-plwfonhj0gjdp9oryhqccjr5a360tgnrhd4s5yrmdc.png\" alt=\"t&#xFC;v WEISS\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/Logo_Teilnehmer_Web-200x83xc-pct68u26be1yvetevoin98h7fcwr2zqt3rxdx18nwg.png\" alt=\"Allianz_fuer_Cybersicherheit_Enginsight\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/402px-Logo_TSG_Hoffenheim.svg-q9cihbab4cxicz309g1m8gy9j7r3dtqitqbg6prncw.png\" alt=\"Logo der TSG Hoffenheim\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/schaefer-holding-logo-2-q4y2lklcscaz3kij4pnp9qm9gj79gm72wdfu1n1s74.jpg\" alt=\"schaefer-holding--logo\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/TuevIT-q9cjpvst6jxyvccd07lryq23jy2nd5obybxae1ombk.png\" alt=\"TuevIT\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/Bildungsministerium-q0947e74k045393rtdllb3aqn7mbxlnduf2dwqdtds.jpg\" alt=\"Bildungsministerium\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/lvv-orvd89v9ad0zrxv9vpg3t9im4r5jf672cjj4auvx8g.jpg\" alt=\"lvv\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/langeoog-orvdagtp8g12v6ol2nkrmplc14cddqwinebwm3mups.jpg\" alt=\"Langeoog\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/hanseyachts-orvd9rg23x2c5ppg6ulu9dzvzptglx3rjwpsnmohds.jpg\" alt=\"hanseyachts\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a9f4d9b elementor-widget elementor-widget-spacer\" data-id=\"4a9f4d9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4280353f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4280353f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1dffc57d\" data-id=\"1dffc57d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e86f4b3 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"e86f4b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\"> <\/span><span class=\"premium-dual-header-second-header \">SIEM Software - COMPREHENSIVE RISK MANAGEMENT for your company<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f7c4e9 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"0f7c4e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b161791 elementor-widget elementor-widget-text-editor\" data-id=\"5b161791\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>SIEM stands for &#x2018;Security Information and Event Management&#x2019;. Sounds complicated, but it&#x2019;s not! The SIEM tool is your personal control centre for more security in the organisation. Like a detective with a magnifying glass and trench coat, a SIEM system monitors all security alarms in real time, keeps an eye on network traffic and keeps a watchful eye on the activities of all users and applications. With the help of a SIEM system, you can sleep easy knowing that your IT security is in the best hands.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-77c85094 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"77c85094\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2c5879ae\" data-id=\"2c5879ae\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d95d99 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"3d95d99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">LOGMANAGEMENT IN SIEM SYSTEMS <\/span><span class=\"premium-dual-header-second-header \">Your control center for intelligent safety analyses<\/span><\/h3> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-289025e1 elementor-widget elementor-widget-text-editor\" data-id=\"289025e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Datalake acts as a central and adaptable database and thus represents the foundation of the entire SIEM system. It acts as the main repository and combines all the raw data collected.<\/p><p>This data is indexed, grouped and presented in normalized form.<\/p><p>In this way, the Datalake lays the foundation for identifying patterns, irregularities and potential threats.<\/p><p>Thanks to the clever use of the collected data, the SIEM software can efficiently identify security events and perform forensic analyses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1b20e5ee\" data-id=\"1b20e5ee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49d7cc7 elementor-widget elementor-widget-image\" data-id=\"49d7cc7\" data-element_type=\"widget\" data-e-type=\"widget\" alt=\"Schwachstellen und Sicherheitsl&#xFC;cken im Dashboard anzeigen\" title=\"Schwachstellen und Sicherheitsl&#xFC;cken im Dashboard anzeigen\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"459\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/SIEM-Enginsight-Datalake-1024x587.jpg\" class=\"attachment-large size-large wp-image-24707\" alt=\"SIEM-Enginsight-Datalake\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/SIEM-Enginsight-Datalake-1024x587.jpg 1024w, https:\/\/enginsight.com\/wp-content\/uploads\/SIEM-Enginsight-Datalake-300x172.jpg 300w, https:\/\/enginsight.com\/wp-content\/uploads\/SIEM-Enginsight-Datalake-768x440.jpg 768w, https:\/\/enginsight.com\/wp-content\/uploads\/SIEM-Enginsight-Datalake.jpg 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e566a75 elementor-widget elementor-widget-html\" data-id=\"e566a75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div>\n        <script src=\"https:\/\/js.storylane.io\/js\/v1\/storylane.js\"><\/script>\n        <button style=\"z-index:999999;padding:7px 15px;border-width:2px;border-style:solid;border-radius:8px;font-weight:600;font-size:18px;height:39px;width:200px;line-height:1.2;filter:drop-shadow(0px 0px 15px rgba(26, 19, 72, 0.25));font-family:Poppins, Arial, sans-serif;white-space:nowrap;overflow:hidden;text-overflow:ellipsis;cursor:pointer;background:#e91e61;border-color:#FFFFFF;color:#FFFFFF\" onclick=\"Storylane.Play({type: 'popup', demo_type: 'image', width: 1264, height: 866, scale: '0.95', demo_url: 'https:\/\/app.storylane.io\/demo\/kncdf0612vpp', padding_bottom: 'calc(68.51% + 27px)'})\">Interactive demo<\/button>\n      <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c24b8b7 elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c24b8b7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6f0ccaaa\" data-id=\"6f0ccaaa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e5905e elementor-widget elementor-widget-image\" data-id=\"7e5905e\" data-element_type=\"widget\" data-e-type=\"widget\" alt=\"CVE Schwachstellen finden und fixen\" title=\"CVE Schwachstellen finden und fixen\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"459\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/SIEM-Enginsight-Workflows-1024x587.jpg\" class=\"attachment-large size-large wp-image-24726\" alt=\"SIEM-Enginsight-Workflows\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/SIEM-Enginsight-Workflows-1024x587.jpg 1024w, https:\/\/enginsight.com\/wp-content\/uploads\/SIEM-Enginsight-Workflows-300x172.jpg 300w, https:\/\/enginsight.com\/wp-content\/uploads\/SIEM-Enginsight-Workflows-768x440.jpg 768w, https:\/\/enginsight.com\/wp-content\/uploads\/SIEM-Enginsight-Workflows.jpg 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbe30f3 elementor-widget elementor-widget-html\" data-id=\"fbe30f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div>\n        <script src=\"https:\/\/js.storylane.io\/js\/v1\/storylane.js\"><\/script>\n        <button style=\"z-index:999999;padding:7px 15px;border-width:2px;border-style:solid;border-radius:8px;font-weight:600;font-size:18px;height:39px;width:200px;line-height:1.2;filter:drop-shadow(0px 0px 15px rgba(26, 19, 72, 0.25));font-family:Poppins, Arial, sans-serif;white-space:nowrap;overflow:hidden;text-overflow:ellipsis;cursor:pointer;background:#e61e61;border-color:#FFFFFF;color:#FFFFFF\" onclick=\"Storylane.Play({type: 'popup', demo_type: 'image', width: 1264, height: 866, scale: '0.95', demo_url: 'https:\/\/app.storylane.io\/demo\/yiwoscwykbo9', padding_bottom: 'calc(68.51% + 27px)'})\">Interactive demo<\/button>\n      <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-76759bdb\" data-id=\"76759bdb\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a58d99 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"1a58d99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Automate security <\/span><span class=\"premium-dual-header-second-header \">Customized workflows<\/span><\/h3> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41fd3a7f elementor-widget elementor-widget-text-editor\" data-id=\"41fd3a7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>By automating responses to specific security events, the SIEM workflows included in the SIEM system can help you reduce the time between detecting and resolving security incidents. With a few simple clicks, you can link different logs and integrate alerts in relation to defined scenarios.<\/p><p><strong>In short<\/strong>, SIEM workflows are an indispensable tool to strengthen your security infrastructure, detect and respond to attacks, and meet compliance requirements.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c73c22 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"4c73c22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Adaptation to specific requirements<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Compliance-Management<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Optimization of resources of your IT team<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4b606218 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4b606218\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-34280234\" data-id=\"34280234\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8e05140 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"8e05140\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Live overviews <\/span><span class=\"premium-dual-header-second-header \">Customized dashboards<\/span><\/h3> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bb4a760 elementor-widget elementor-widget-text-editor\" data-id=\"1bb4a760\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-db0810c elementor-widget elementor-widget-text-editor\" data-id=\"db0810c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Who knows the needs of your company better than you? Within the SIEM software in the \u2018Cockpits\u2019 area, you can customise your own dashboards. Each display in the cockpit is based on a predefined or customised event stream. You also have the freedom to create different views based on a single stream.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e679fb elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"3e679fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Darkmode for your Security Operation Center (SOC)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Individual scaling of the widgets<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Mapping of all data\/scenarios from your log<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Multiple dashboards possible for different scenarios<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-523b28cc\" data-id=\"523b28cc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a74bb6d elementor-widget elementor-widget-image\" data-id=\"a74bb6d\" data-element_type=\"widget\" data-e-type=\"widget\" alt=\"Schwachstellen und Sicherheitsl\u00fccken im Dashboard anzeigen\" title=\"Schwachstellen und Sicherheitsl\u00fccken im Dashboard anzeigen\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"459\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/SIEM-Enginsight-Graphen-1024x587.jpg\" class=\"attachment-large size-large wp-image-24729\" alt=\"SIEM-Enginsight-Graphen\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/SIEM-Enginsight-Graphen-1024x587.jpg 1024w, https:\/\/enginsight.com\/wp-content\/uploads\/SIEM-Enginsight-Graphen-300x172.jpg 300w, https:\/\/enginsight.com\/wp-content\/uploads\/SIEM-Enginsight-Graphen-768x440.jpg 768w, https:\/\/enginsight.com\/wp-content\/uploads\/SIEM-Enginsight-Graphen.jpg 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24ce49a elementor-widget elementor-widget-html\" data-id=\"24ce49a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div>\n        <script src=\"https:\/\/js.storylane.io\/js\/v1\/storylane.js\"><\/script>\n        <button style=\"z-index:999999;padding:7px 15px;border-width:2px;border-style:solid;border-radius:8px;font-weight:600;font-size:18px;height:39px;width:200px;line-height:1.2;filter:drop-shadow(0px 0px 15px rgba(26, 19, 72, 0.25));font-family:Poppins, Arial, sans-serif;white-space:nowrap;overflow:hidden;text-overflow:ellipsis;cursor:pointer;background:#e61e61;border-color:#FFFFFF;color:#FFFFFF\" onclick=\"Storylane.Play({type: 'popup', demo_type: 'image', width: 1264, height: 864, scale: '0.95', demo_url: 'https:\/\/app.storylane.io\/demo\/bmpml4o65p4e', padding_bottom: 'calc(68.35% + 27px)'})\">Interactive demo<\/button>\n      <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-64caba94 elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"64caba94\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ccf4adb\" data-id=\"ccf4adb\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2dacb2eb elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"2dacb2eb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6440a870\" data-id=\"6440a870\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2006b277 premium-video__glow-none elementor-widget elementor-widget-premium-addon-video-box\" data-id=\"2006b277\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_video_box_video_type&quot;:&quot;youtube&quot;,&quot;aspect_ratio&quot;:&quot;169&quot;,&quot;video_lightbox_style&quot;:&quot;elementor&quot;}\" data-widget_type=\"premium-addon-video-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t\t\n\t\t\t\t\t<div data-lightbox=\"{&quot;type&quot;:&quot;elementor&quot;}\" id=\"premium-video-box-container-2006b277\" class=\"premium-video-box-container\" data-overlay=\"true\" data-type=\"youtube\" data-thumbnail=\"1\" data-hover=\"zoomin\">\n\t\t\t\t<div  >\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"premium-video-box-inner-wrap\" data-video-animation=\" animated-\" data-delay-animation=\"\">\n\t\t\t\t\t\t<div data-elementor-open-lightbox=\"yes\" data-elementor-lightbox=\"{&quot;type&quot;:&quot;video&quot;,&quot;videoType&quot;:&quot;youtube&quot;,&quot;url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/embed\\\/Im3CS_4g8tA?feature=oembed&amp;rel=0&amp;mute=0&amp;loop=0&amp;controls=1&amp;playsinline=0&amp;cc_load_policy=0&quot;,&quot;modalOptions&quot;:{&quot;id&quot;:&quot;elementor-lightbox-2006b277&quot;,&quot;entranceAnimation&quot;:&quot;&quot;,&quot;entranceAnimation_tablet&quot;:&quot;&quot;,&quot;entranceAnimation_mobile&quot;:&quot;&quot;,&quot;videoAspectRatio&quot;:&quot;169&quot;}}\" class=\"premium-video-box-video-container\">\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div style=\"background-image:url(&#039;https:\/\/enginsight.com\/wp-content\/uploads\/enginsight-partnerevent-2023.jpg&#039;)\" class=\"premium-video-box-image-container zoomin\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-video-box-play-icon-container\">\n\t\t\t\t\t\t\t\t<i class=\"premium-video-box-play-icon fas fa-play\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-video-box-description-container\">\n\t\t\t\t\t\t\t\t<p class=\"premium-video-box-text\">\n\t\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\t\tReference video\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-inner-column elementor-element elementor-element-2f32f480\" data-id=\"2f32f480\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-deee0ac elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default\" data-id=\"deee0ac\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-670055af\" data-id=\"670055af\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3eb3cf10 elementor-widget elementor-widget-text-editor\" data-id=\"3eb3cf10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-id=\"2227ecd9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div>\n<h4>IT&#8217;S NOT ABOUT IT SECURITY, IT&#8217;S ABOUT OPERABILITY AND RESILIENCE<\/h4>\n<\/div>\n<\/div>\n<div data-id=\"7504f8e0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div>\n<div><span style=\"color: #e91e63;\">MAKE IT SECURITY PART OF YOUR DNA<\/span><\/div>\n<\/div>\n<\/div>\n<div data-id=\"3c8808db\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<p>Effective risk management requires <strong>continuous condition monitoring<\/strong> in combination with <strong>preventive measures<\/strong> as well as a <strong>data basis for forensic analyses<\/strong>.<\/p>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e062d2a elementor-section-height-min-height elementor-section-boxed elementor-section-height-default\" data-id=\"e062d2a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5776d01d\" data-id=\"5776d01d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4621ea39 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default\" data-id=\"4621ea39\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2786a6e5\" data-id=\"2786a6e5\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-70eac18 elementor-widget elementor-widget-counter\" data-id=\"70eac18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">secured systems by Enginsight in the German midmarket and public sector<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\">&gt;<\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"20000\" data-from-value=\"0\" data-delimiter=\".\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-inner-column elementor-element elementor-element-2b0323c8\" data-id=\"2b0323c8\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-15954fb0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"15954fb0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2a7b2b7b\" data-id=\"2a7b2b7b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-64234815 elementor--star-style-star_fontawesome elementor-widget elementor-widget-reviews\" data-id=\"64234815\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;slides_per_view&quot;:&quot;1&quot;,&quot;speed&quot;:500,&quot;space_between&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]}}\" data-widget_type=\"reviews.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t\t\t<div class=\"elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Slides\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-fd13e6e\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial__header\">\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">Sch\u00e4fer Holding GmbH<\/span><div class=\"elementor-star-rating\"><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><\/div><span class=\"elementor-testimonial__title\">Marcel Pasternak, Process Manager<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\" aria-label=\"Read More\"><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__content\">\n\t\t\t\t\t<div class=\"elementor-testimonial__text\">\n\t\t\t\t\t\t\"Enginsight saved our TISAX certification.\"\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-a1bf9aa\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial__header\">\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">S\u00f6mmerdaer Energieversorgung GmbH<\/span><div class=\"elementor-star-rating\"><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><\/div><span class=\"elementor-testimonial__title\">Mario Haller, Administrator<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\" aria-label=\"Read More\"><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__content\">\n\t\t\t\t\t<div class=\"elementor-testimonial__text\">\n\t\t\t\t\t\t\"In day-to-day business, there is always the risk that events or security vulnerabilities slip through because we in the IT department don't have the time to manually examine the systems in depth. With Enginsight, I have a traffic light that tells me: watch out, there's something there! And then I can take care of it. For me, Enginsight has therefore become a guidance system that helps me cross the street.\"\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-5f60aa7\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial__header\">\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\"> ISO Schmiede GmbH<\/span><div class=\"elementor-star-rating\"><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><\/div><span class=\"elementor-testimonial__title\">Steven L\u00f6ffler, External Auditor<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\" aria-label=\"Read More\"><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__content\">\n\t\t\t\t\t<div class=\"elementor-testimonial__text\">\n\t\t\t\t\t\t\"Enginsight plays a major role in the implementation and continued operation of a management system. Enginsight's solution in the area of pentesting offers a target-oriented way of identifying weak points at an early stage and nipping corresponding dangers in the bud.\" \t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-e9aa4a3\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial__header\">\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">MVS Wilke<\/span><div class=\"elementor-star-rating\"><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><\/div><span class=\"elementor-testimonial__title\">Klaus Wilke, Managing Director <\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\" aria-label=\"Read More\"><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__content\">\n\t\t\t\t\t<div class=\"elementor-testimonial__text\">\n\t\t\t\t\t\t\"Enginsight is simply the most personable solution for attack detection and defense. I was enthusiastic about it right from the start. Intuitive to use, resource-efficient through automations, and reportable in a management-ready manner, the software simply makes everyone happy: IT admins, business managers, and auditors. Love it.\"\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bf435b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bf435b8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-265c101\" data-id=\"265c101\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4dd2dba premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"4dd2dba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">SIEM SOLUTIONS <\/span><span class=\"premium-dual-header-second-header \">Functions &amp; applications of the SIEM software<\/span><\/h4> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f598353 elementor-widget elementor-widget-text-editor\" data-id=\"f598353\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Would you like to know more about the SIEM system? <br \/>Find out how the Enginsight SIEM tool works and how it makes your daily security work easier.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c83451b elementor-widget elementor-widget-toggle\" data-id=\"c83451b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2091\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2091\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened jki jki-minus-solid\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Energy provider<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2091\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2091\"><p>An electric utility could become the target of a cyberattack aimed at disrupting the power supply. A SIEM system can detect such attacks at an early stage and initiate countermeasures to maintain the power supply.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2092\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2092\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened jki jki-minus-solid\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Information technology and telecommunications<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2092\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2092\"><p>A telecom provider could be subject to attacks such as DDoS that aim to disrupt service. SIEM solutions can detect these attacks and respond quickly to ensure service availability.<\/p><p>From the outside, the sensors examine the open ports and the web application for vulnerable software. By optionally storing access data (auth provider), operating systems and installed software can be retrieved, results expanded and validation improved.<\/p><ul><li>Scan networks for security vulnerabilities<\/li><li>Websites and web portals<\/li><li>Deposit auth providers for SNMP, WMI, SSH<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2093\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2093\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened jki jki-minus-solid\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Transport and traffic<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2093\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2093\"><p>Airports and train stations rely on complex IT systems. An attack on these systems could paralyze traffic. A SIEM system can identify such attacks and enable rapid response to keep traffic flowing.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2094\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-2094\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened jki jki-minus-solid\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Health \/ Hospitals<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2094\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-2094\"><p>Hospitals manage sensitive patient data and rely on medical devices. A cyberattack could compromise this data or affect the devices. SIEM systems can help maintain data integrity and ensure patient safety.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2095\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-2095\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened jki jki-minus-solid\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Water supplier<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2095\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-2095\"><p>Water utilities could be the target of an attack that compromises water quality. A SIEM solution can help protect the integrity of the water supply by detecting attacks and initiating countermeasures.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2096\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-2096\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened jki jki-minus-solid\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Nutrition \/ Food producers<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2096\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-2096\"><p>Food producers could be impacted by cyberattacks on their production facilities. SIEM systems can detect and remedy production disruptions to ensure food supply.<\/p><p>Use autofixes to correct configurations directly from the Enginsight platform.<\/p><p>The Security Technical Implementation Guides (STIGs) integrated for all common operating systems can be extended with your own guidelines. This also allows documentation requirements to be fulfilled effectively.<\/p><ul><li>Microsoft Windows 10<\/li><li>Microsoft Server 2008\/2012\/2016\/2021<\/li><li>Canonical Ubuntu 16\/18\/20<\/li><li>Red Hat Enterprise 6<\/li><li>SUSE Linux Enterprise 12<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2097\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-2097\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened jki jki-minus-solid\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Finance and insurance<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2097\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-2097\"><p>Banks and insurance companies are frequent targets of cyberattacks aimed at stealing financial data. SIEM systems can monitor unusual transactions and raise the alert to prevent financial loss.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-feb4e97 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"feb4e97\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2a3886d\" data-id=\"2a3886d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a389c0e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a389c0e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6c11afc\" data-id=\"6c11afc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d9a7c28 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"d9a7c28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">MAKING THE INVISIBLE VISIBLE - MAKING THE INSECURE SECURE <\/span><span class=\"premium-dual-header-second-header \">SIEM Industry solutions<\/span><\/h6> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f732e39 elementor-widget elementor-widget-text-editor\" data-id=\"f732e39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In addition to the SIEM tool, you can find more information about your industry requirements and how to fulfil them with Enginsight here. <br \/>Your industry is not listed here? Please let us know and we will work out the degree of fulfilment of your standard with the help of Enginsight.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1f6671 elementor-icon-list--layout-inline elementor-align-start elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"e1f6671\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/enginsight.com\/de\/kritis-cybersecurity\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">CRITICAL INFRASTRUCTURE (KRITIS)<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">VDA ISA (TISAX)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/enginsight.com\/de\/oeffentlichen-einrichtungen-verwaltungen\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Public administration<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/enginsight.com\/de\/isms-iso-27001\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">ISMS \/ ISO 27001<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/enginsight.com\/de\/it-security-wohnungsbau\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Housing \/ Cooperatives<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f914043 elementor-align-left elementor-mobile-align-left elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-button\" data-id=\"f914043\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/enginsight.com\/de\/demo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Request a demo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2fb4e78d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"2fb4e78d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-56356a82\" data-id=\"56356a82\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7d539769 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7d539769\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-38d357f3\" data-id=\"38d357f3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-554a3be1 elementor-widget elementor-widget-image\" data-id=\"554a3be1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"795\" height=\"1024\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-795x1024.png\" class=\"attachment-large size-large wp-image-21750\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-795x1024.png 795w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-233x300.png 233w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-768x989.png 768w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-1193x1536.png 1193w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-1590x2048.png 1590w\" sizes=\"(max-width: 795px) 100vw, 795px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Mario Jandeck, CEO Enginsight GmbH<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b37916c elementor-widget elementor-widget-html\" data-id=\"b37916c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- ProvenExpert Bewertungssiegel -->\n<a href=\"https:\/\/www.provenexpert.com\/enginsight\/?utm_source=Widget&amp;utm_medium=Widget&amp;utm_campaign=Widget\" title=\"Customer reviews &amp; experiences for Enginsight. Show more info.\" target=\"_blank\" style=\"text-decoration:none;\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/images.provenexpert.com\/73\/1e\/036d71c53e8e46a6fca13e08d3e4\/widget_square_190_de_0.png\" alt=\"Experiences &amp; Reviews for Enginsight\" width=\"190\" height=\"190\" style=\"border:0\"><\/a>\n<!-- ProvenExpert Bewertungssiegel -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1d0f061f\" data-id=\"1d0f061f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4825a74c elementor-widget elementor-widget-heading\" data-id=\"4825a74c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">FAQ about the SIEM from Enginsight<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d157ca elementor-widget elementor-widget-toggle\" data-id=\"8d157ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1471\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1471\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">How much does the SIEM cost?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1471\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1471\"><p>The SIEM software is an add-on to your existing Enginsight licence and is available from just \u20ac 2.20 per asset (total number of servers and clients). <br \/>The prerequisite is the use of an existing Enginsight instance. Separate provisions apply for the public sector (KRITIS, public sector). If you have any further questions about the SIEM system or other cybersecurity measures, please feel free to contact us at any time.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1472\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1472\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Can I connect my firewall to Enginsight SIEM system?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1472\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1472\"><p>Yes, we have already automatically connected a large number of firewalls to the SIEM system. If your firewall is not included, we will integrate it within one working week. You also have the option of using our extractors to address individual data sources via regex.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1473\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1473\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What are the technical requirements?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1473\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1473\"><p>In our <a href=\"https:\/\/docs.enginsight.com\/docs\/on-premises\/installationsanleitung\/siem\" target=\"_blank\" rel=\"noopener\">documentation &gt;&gt;<\/a> you will find a detailed infrastructure explanation including. Installation guide and product description for Enginsight SIEM. <\/p>\n<p>We or our experienced <a href=\"https:\/\/enginsight.com\/en\/enginsight-partner\/\" target=\"_blank\" rel=\"noopener\">partners&gt;&gt;<\/a> will gladly take care of the installation and setup. Just contact us \ud83d\ude42<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1474\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1474\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What does a SIEM system do? <\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1474\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1474\"><p>A SIEM system pulls together event data from multiple sources within your network infrastructure, including servers, systems, devices and applications. <br \/>By integrating contextual information about users or assets, a SIEM solution provides a holistic overview with additional insights. The collected data is consolidated by the SIEM system and subjected to in-depth analysis to identify deviations from your company&#8217;s defined rules of behaviour. In this way, the SIEM system functions as a comprehensive security solution that is based on the thorough evaluation of event data and aims to recognise potential threats. It therefore makes a significant contribution to ensuring the integrity of your network and responding proactively to security risks. <\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1475\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1475\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Why a SIEM system? <\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1475\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1475\"><p>The need for a SIEM system stems from its ability to detect patterns and anomalous behaviour. <br \/>Even if a single event does not set off alarm bells, the SIEM tool can detect potential threats by correlating multiple events that would otherwise go unnoticed. The system is designed to perform a comprehensive analysis and trigger notifications as required. These logs are carefully stored by the SIEM tool in a database. This storage enables you to carry out in-depth forensic investigations or prove compliance requirements by having access to detailed records. Thus, a SIEM system not only ensures early detection of potential threats, but also provides the necessary resources for comprehensive security analysis and compliance checks.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1476\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1476\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What is a SIEM tool? <\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1476\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1476\"><p>A SIEM tool is the software that acts as the central instance for analysis-based cybersecurity within a SIEM system. All event data is recorded in a central location. The SIEM tool assumes full responsibility for analysis and categorisation.Of particular importance here is that the SIEM tool provides the appropriate context that enables security analysts to gain in-depth insights into security events within the infrastructure.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"How much does the SIEM cost?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>The SIEM software is an add-on to your existing Enginsight licence and is available from just \\u20ac 2.20 per asset (total number of servers and clients). <br \\\/>The prerequisite is the use of an existing Enginsight instance. Separate provisions apply for the public sector (KRITIS, public sector). If you have any further questions about the SIEM system or other cybersecurity measures, please feel free to contact us at any time.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Can I connect my firewall to Enginsight SIEM system?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Yes, we have already automatically connected a large number of firewalls to the SIEM system. If your firewall is not included, we will integrate it within one working week. You also have the option of using our extractors to address individual data sources via regex.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"What are the technical requirements?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>In our <a href=\\\"https:\\\/\\\/docs.enginsight.com\\\/docs\\\/on-premises\\\/installationsanleitung\\\/siem\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">documentation &gt;&gt;<\\\/a> you will find a detailed infrastructure explanation including. Installation guide and product description for Enginsight SIEM. <\\\/p>\\n<p>We or our experienced <a href=\\\"https:\\\/\\\/enginsight.com\\\/en\\\/enginsight-partner\\\/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">partners&gt;&gt;<\\\/a> will gladly take care of the installation and setup. Just contact us :-)<\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"What does a SIEM system do?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>A SIEM system pulls together event data from multiple sources within your network infrastructure, including servers, systems, devices and applications. <br \\\/>By integrating contextual information about users or assets, a SIEM solution provides a holistic overview with additional insights. The collected data is consolidated by the SIEM system and subjected to in-depth analysis to identify deviations from your company&#8217;s defined rules of behaviour. In this way, the SIEM system functions as a comprehensive security solution that is based on the thorough evaluation of event data and aims to recognise potential threats. It therefore makes a significant contribution to ensuring the integrity of your network and responding proactively to security risks. <\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Why a SIEM system?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>The need for a SIEM system stems from its ability to detect patterns and anomalous behaviour. <br \\\/>Even if a single event does not set off alarm bells, the SIEM tool can detect potential threats by correlating multiple events that would otherwise go unnoticed. The system is designed to perform a comprehensive analysis and trigger notifications as required. These logs are carefully stored by the SIEM tool in a database. This storage enables you to carry out in-depth forensic investigations or prove compliance requirements by having access to detailed records. Thus, a SIEM system not only ensures early detection of potential threats, but also provides the necessary resources for comprehensive security analysis and compliance checks.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"What is a SIEM tool?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>A SIEM tool is the software that acts as the central instance for analysis-based cybersecurity within a SIEM system. All event data is recorded in a central location. The SIEM tool assumes full responsibility for analysis and categorisation.Of particular importance here is that the SIEM tool provides the appropriate context that enables security analysts to gain in-depth insights into security events within the infrastructure.<\\\/p>\"}}]}<\/script>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7077acbe elementor-align-left elementor-mobile-align-center elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-button\" data-id=\"7077acbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/enginsight.com\/en\/demo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Arrange consultation appointment<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42aebfd8 elementor-widget elementor-widget-text-editor\" data-id=\"42aebfd8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The SIEM is part of the Enginsight Cybersecurity Platform. <\/p>\n<p>Would you like to know how you can improve your IT security with Enginsight? We would be happy to analyze your current status and real needs in the area of IT and network security together with you.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>SIEM system from Enginsight Your SIEMphony for cyber attack detection and defense Enginsight SIEM (Security Information and Event Management) gives you proactive, real-time protection and comprehensive security intelligence across all data sources. Like a good symphony, all the software components in Enginsight work together and automatically enrich the SIEM system with information from the area [&#x2026;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","_eb_attr":"","footnotes":""},"class_list":["post-24835","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages\/24835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/comments?post=24835"}],"version-history":[{"count":0,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages\/24835\/revisions"}],"wp:attachment":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/media?parent=24835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}